41,165 research outputs found
FASS: A Fairness-Aware Approach for Concurrent Service Selection with Constraints
The increasing momentum of service-oriented architecture has led to the
emergence of divergent delivered services, where service selection is meritedly
required to obtain the target service fulfilling the requirements from both
users and service providers. Despite many existing works have extensively
handled the issue of service selection, it remains an open question in the case
where requests from multiple users are performed simultaneously by a certain
set of shared candidate services. Meanwhile, there exist some constraints
enforced on the context of service selection, e.g. service placement location
and contracts between users and service providers. In this paper, we focus on
the QoS-aware service selection with constraints from a fairness aspect, with
the objective of achieving max-min fairness across multiple service requests
sharing candidate service sets. To be more specific, we study the problem of
fairly selecting services from shared candidate sets while service providers
are self-motivated to offer better services with higher QoS values. We
formulate this problem as a lexicographical maximization problem, which is far
from trivial to deal with practically due to its inherently multi-objective and
discrete nature. A fairness-aware algorithm for concurrent service selection
(FASS) is proposed, whose basic idea is to iteratively solve the
single-objective subproblems by transforming them into linear programming
problems. Experimental results based on real-world datasets also validate the
effectiveness and practicality of our proposed approach.Comment: IEEE International Conference on Web Services (IEEE ICWS 2019), 9
page
Strategy-proof Pricing Approach for Cloud Market
In this paper, we design and develop a pricing model applicable to strategy
proof pricing. To provide an economic stability towards its consumers. The
economic model we use is Vickrey-Clarke-Groves (VCG). By this each service
provider has to provide a true cost of its services in the cloud market. For
the selection of suitable service for the consumer we adopt a dynamic
programing based algorithm and VCG is used to calculate the payment. Strategy
proof pricing offers a unique cloud pricing service that takes the complexity
out of traditional pricing and enables cloud providers to price accurately,
consistently and competitivelyComment: Includes 2 Figures, 2 Tables and 4 Pages. Presented in International
Conference on Communication, Information and Computing Technology (ICCICT-15)
held in Amritsar on 12-13 May, 201
Online Learning for Offloading and Autoscaling in Energy Harvesting Mobile Edge Computing
Mobile edge computing (a.k.a. fog computing) has recently emerged to enable
in-situ processing of delay-sensitive applications at the edge of mobile
networks. Providing grid power supply in support of mobile edge computing,
however, is costly and even infeasible (in certain rugged or under-developed
areas), thus mandating on-site renewable energy as a major or even sole power
supply in increasingly many scenarios. Nonetheless, the high intermittency and
unpredictability of renewable energy make it very challenging to deliver a high
quality of service to users in energy harvesting mobile edge computing systems.
In this paper, we address the challenge of incorporating renewables into mobile
edge computing and propose an efficient reinforcement learning-based resource
management algorithm, which learns on-the-fly the optimal policy of dynamic
workload offloading (to the centralized cloud) and edge server provisioning to
minimize the long-term system cost (including both service delay and
operational cost). Our online learning algorithm uses a decomposition of the
(offline) value iteration and (online) reinforcement learning, thus achieving a
significant improvement of learning rate and run-time performance when compared
to standard reinforcement learning algorithms such as Q-learning. We prove the
convergence of the proposed algorithm and analytically show that the learned
policy has a simple monotone structure amenable to practical implementation.
Our simulation results validate the efficacy of our algorithm, which
significantly improves the edge computing performance compared to fixed or
myopic optimization schemes and conventional reinforcement learning algorithms.Comment: arXiv admin note: text overlap with arXiv:1701.01090 by other author
Hybrid Optimization Algorithm for Large-Scale QoS-Aware Service Composition
In this paper we present a hybrid approach for automatic composition of Web
services that generates semantic input-output based compositions with optimal
end-to-end QoS, minimizing the number of services of the resulting composition.
The proposed approach has four main steps: 1) generation of the composition
graph for a request; 2) computation of the optimal composition that minimizes a
single objective QoS function; 3) multi-step optimizations to reduce the search
space by identifying equivalent and dominated services; and 4) hybrid
local-global search to extract the optimal QoS with the minimum number of
services. An extensive validation with the datasets of the Web Service
Challenge 2009-2010 and randomly generated datasets shows that: 1) the
combination of local and global optimization is a general and powerful
technique to extract optimal compositions in diverse scenarios; and 2) the
hybrid strategy performs better than the state-of-the-art, obtaining solutions
with less services and optimal QoS.Comment: Preprint accepted to appear in IEEE Transactions on Services
Computing 201
Towards Logical Architecture and Formal Analysis of Dependencies Between Services
This paper presents a formal approach to modelling and analysis of data and
control flow dependencies between services within remotely deployed distributed
systems of services. Our work aims at elaborating for a concrete system, which
parts of the system (or system model) are necessary to check a given property.
The approach allows services decomposition oriented towards efficient checking
of system properties as well as analysis of dependencies within a system.Comment: Preprint, The 2014 Asia-Pacific Services Computing Conference (APSCC
2014
The Price of Anarchy in Auctions
This survey outlines a general and modular theory for proving approximation
guarantees for equilibria of auctions in complex settings. This theory
complements traditional economic techniques, which generally focus on exact and
optimal solutions and are accordingly limited to relatively stylized settings.
We highlight three user-friendly analytical tools: smoothness-type
inequalities, which immediately yield approximation guarantees for many auction
formats of interest in the special case of complete information and
deterministic strategies; extension theorems, which extend such guarantees to
randomized strategies, no-regret learning outcomes, and incomplete-information
settings; and composition theorems, which extend such guarantees from simpler
to more complex auctions. Combining these tools yields tight worst-case
approximation guarantees for the equilibria of many widely-used auction
formats
The Load and Availability of Byzantine Quorum Systems
Replicated services accessed via {\em quorums} enable each access to be
performed at only a subset (quorum) of the servers, and achieve consistency
across accesses by requiring any two quorums to intersect. Recently,
-masking quorum systems, whose intersections contain at least
servers, have been proposed to construct replicated services tolerant of
arbitrary (Byzantine) server failures. In this paper we consider a hybrid fault
model allowing benign failures in addition to the Byzantine ones. We present
four novel constructions for -masking quorum systems in this model, each of
which has optimal {\em load} (the probability of access of the busiest server)
or optimal availability (probability of some quorum surviving failures). To
show optimality we also prove lower bounds on the load and availability of any
-masking quorum system in this model.Comment: preprint of a paper to appear in the SIAM Journal of Computin
Simulation-Checking of Real-Time Systems with Fairness Assumptions
We investigate the simulation problem in of dense-time system. A
specification simulates a model if the specification can match every transition
that the model can make at a time point. We also adapt the approach of Emerson
and Lei and allow for multiple strong and weak fairness assumptions in checking
the simulation relation. Furthermore, we allow for fairness assumptions
specified as either state-predicates or event-predicates. We focus on a
subclass of the problem with at most one fairness assumption for the
specification. We then present a simulation-checking algorithm for this
subclass. We propose simulation of a model by a specification against a common
environment. We present efficient techniques for such simulations to take the
common environment into consideration. Our experiment shows that such a
consideration can dramatically improve the efficiency of checking simulation.
We also report the performance of our algorithm in checking the liveness
properties with fairness assumptions.Comment: 18 pages, 5 figures, part of the materials appear in the proceedings
of FOMRATS 2007 and HSCC 200
Universal Randomized Guessing with Application to Asynchronous Decentralized Brute-Force Attacks
Consider the problem of guessing the realization of a random vector
by repeatedly submitting queries (guesses) of the form "Is
equal to ?" until an affirmative answer is obtained.
In this setup, a key figure of merit is the number of queries required until
the right vector is identified, a number that is termed the \emph{guesswork}.
Typically, one wishes to devise a guessing strategy which minimizes a certain
guesswork moment.
In this work, we study a universal, decentralized scenario where the guesser
does not know the distribution of , and is not allowed to use a
strategy which prepares a list of words to be guessed in advance, or even
remember which words were already used. Such a scenario is useful, for example,
if bots within a Botnet carry out a brute-force attack in order to guess a
password or decrypt a message, yet cannot coordinate the guesses between them
or even know how many bots actually participate in the attack.
We devise universal decentralized guessing strategies, first, for memoryless
sources, and then generalize them for finite-state sources. In each case, we
derive the guessing exponent, and then prove its asymptotic optimality by
deriving a compatible converse bound. The strategies are based on randomized
guessing using a universal distribution. We also extend the results to guessing
with side information. Finally, for all above scenarios, we design efficient
algorithms in order to sample from the universal distributions, resulting in
strategies which do not depend on the source distribution, are efficient to
implement, and can be used asynchronously by multiple agents
Pareto-optimal Nash equilibrium in capacity allocation game for self-managed networks
In this paper we introduce a capacity allocation game which models the
problem of maximizing network utility from the perspective of distributed
noncooperative agents. Motivated by the idea of self-managed networks, in the
developed framework decision-making entities are associated with individual
transmission links, deciding on the way they split capacity among concurrent
flows. An efficient decentralized algorithm is given for computing strongly
Pareto-optimal strategies, constituting a pure Nash equilibrium. Subsequently,
we discuss the properties of the introduced game related to the Price of
Anarchy and Price of Stability. The paper is concluded with an experimental
study.Comment: Computer Networks, 201
- …